|
I am new here please Help thanks
|
Question 1. ITCertKeys.com wants to use distinct security policies for different departments. What must be configured? A. individual security level for each department B. separate ACL group for each department C. distinct VLAN for each department D. unique firewall context for each department Answer: D Question 2. Exhibit: You work as a network administrator at ITCertKeys.com. You study the exhibit carefully. ITCertKeysA, ITCertKeysB, C, and ITCertKeys4 each represents a model for placement of a default gateway. Which model allows the maximum number of application and security services? A. model ITCertKeysB B. model C C. model ITCertKeysA D. model ITCertKeysD Answer: B Question 3. Which of the following attack types should be mitigated in the data center core layer? A. IP spoofing B. MAC address spoofing C. port scans D. DDoS attacks Answer: D Question 4. Exhibit: You work as a network administrator at ITCertKeys.com. You study the exhibit carefully. A failure occurs on one of the access layer uplinks. Which Layer 2 topology can cause a break in connectivity between the FWSMs? A. looped triangle B. loop-free inverted U C. loop-free U D. looped square Answer: C Question 5. Which type of HPC application requires low latency? A. financial analytics B. seismic and geophysical modeling C. digital image rendering D. finite element analysis Answer: D Question 6. Which statement best describes the data center core layer? A. provides a resilient Layer 2 routed fabric B. load balances traffic between the core and aggregation layers C. is typically merged with the campus core layer D. connects to the campus aggregation layer Answer: B Question 7. Which data center network-architecture change is a result of the adoption of blade and 1-RU server technologies? A. Layer 3 fault domains growing smaller B. Layer 2 fault domains growing larger C. Layer 2 fault domains growing smaller D. Layer 3 fault domains growing larger Answer: B Question 8. What advantage does InfiniBand have over Gigabit Ethernet in HPC environments? A. simpler cabling B. longer distance support C. more sophisticated traffic management D. lower latency Answer: D Question 9. Exhibit: You work as a network administrator at ITCertKeys.com. You study the exhibit carefully. Where is Layer 2 adjacency required? A. server-to-server only B. aggregation-to-access only C. aggregation-to-access and access-to-server D. access-to-server only Answer: D Question 10. According to the Cisco Network Foundation Protection model, which security feature is recommended for the data center core layer? A. prefix filtering B. Dynamic ARP Inspection C. traffic rate limiting D. control plane protection Answer: D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.